CyberWire Daily - IoT 2017 – Securing the Things: A CyberWire Special Edition [Special Edition]

Episode Date: June 29, 2017

The IoT, or Internet of Things, broadly defined is the collection of physical objects with IP addresses, connected to the internet. From consumer devices like security cameras, DVRs, and smart thermos...tats to industrial control systems and autonomous cars, the IoT offers potential for both opportunity and vulnerability.  In the first half of this CyberWire Special Edition, we speak with IoT experts Katie Curtin, director of IoT cyber security product management for AT&T, and Chris Poulin, Principal at Booz Allen Hamilton, where he leads internet of things security strategy for their strategic innovation group, as well as their industrial control group.  They provide their take on the current state of the internet of things for consumers, enterprise, industrial control and even self-driving cars. In the second part of our program, we examine third party risk. Ponemon Institute recently released an independent research report titled, “The Internet of Things - a New Era of Third Party Risk.” Dr. Larry Ponemon is the chairman and founder of Ponemon Institute, and he’s going to take us through some of the report’s findings, but first we’ll hear from Gary Roboff, a senior advisor at Shared Assessments and their Santa Fey group, who were the sponsors of the report. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the CyberWire Network, powered by N2K. Calling all sellers. Salesforce is hiring account executives to join us on the cutting edge of technology. Here, innovation isn't a buzzword. It's a way of life. You'll be solving customer challenges faster with agents, winning with purpose, and showing the world what AI was meant to be. Let's create the agent-first
Starting point is 00:00:30 future together. Head to salesforce.com slash careers to learn more. In a darkly comedic look at motherhood and society's expectations, Academy Award-nominated Amy Adams stars as a passionate artist who puts her career on hold to stay home with her young son. But her maternal instincts take a wild and surreal turn as she discovers the best yet fiercest part of herself.
Starting point is 00:00:55 Based on the acclaimed novel, Night Bitch is a thought-provoking and wickedly humorous film from Searchlight Pictures. Stream Night Bitch January 24 only on Disney+. The IoT, or Internet of Things, broadly defined is the collection of physical objects with IP addresses connected to the Internet. From consumer devices like security cameras, DVRs, and smart thermostats to industrial control systems and autonomous cars, the IoT offers potential for opportunity and vulnerability. In the first half of this CyberWire special edition, we speak with IoT experts for their take on the current state of the Internet of Things for consumers, enterprise, industrial control, and even self-driving cars.
Starting point is 00:01:41 Later in the program, we examine third-party risk with some sobering statistics from a recent IoT industry survey. Stay with us. We're certainly living in a new world, in a new connected world, that is. Katie Curtin is Director of IoT cybersecurity product management for AT&T. With self-driving cars quickly emerging or smart manufacturing environments really ran by robots, or even smart city environments where all the data and diagnostics is collected through connected energy grids or streetlights or water supply networks, through connected energy grids or streetlights or water supply networks, we're really living in a new type of world where connectivity is paramount. It's driving new types of devices now being connected to the Internet
Starting point is 00:02:34 and creating a lot of value for the consumers of those devices. However, when we talk about security and these newly connected devices now back on the grid, becoming really critical components of how the business and the public systems are now using these devices have now become almost like infrastructure. So the need to secure these devices and secure these environments, folks cannot afford a compromised scenario. So with IoT security, definitely growing in more concern. And as we see more headlined examples where devices can be leveraged for malicious reasons, certainly security is top of mind now and more so brought into those
Starting point is 00:03:09 conversations when we start addressing the value of IoT. There's two parts to that. Number one is where are we from the actual functional perspective, right? So why are people making and adopting IoT devices? Chris Poulin is a principal at Booz Allen Hamilton, leading the Internet of Things security strategy for their strategic innovation group, as well as their industrial control group. We're still sort of on the beginning stages of that, I think. We're transitioning away from people just coming up with random ideas and putting them into products and actually starting to think about what the value is. That's good. The problem is that we're still finding our way.
Starting point is 00:03:44 We're still sort of at the beginning of figuring out how to make things and how to instrument them and how to make them intercommunicate. And as always, though, the second component is security, which is, when I say as always, I mean it's an afterthought. So I know that there are lots of IoT makers who are starting to think about security. And a lot of them, by the way, think about security early on in the process, but they don't bother to flesh it out because it's slow. It slows down progress. It slows down development of the product in the first place. Security is often at odds with functionality. So the perfectly secure product does nothing,
Starting point is 00:04:19 right? And the perfectly functional product has no security. So there's always this tension between those two things. And so it's usually put off until after the product has been proven and produced and there's a market for it. So one of the big problems in this space is that a lot of these devices that are now being connected to the internet were never built to be connected to the internet. They're legacy devices, PLCs, HMIs that serve a great purpose and are very robust devices and perform robust operational functions. But now that they're being connected to the internet, it brings a boatload of new security concerns and questions about how to secure these devices. One of the big key learnings that we've learned in talking with our customers is that, you know, while
Starting point is 00:05:00 manufacturing energy and similar industrial verticals are adopting IoT for the obvious reasons and value that it provides, the ability to secure these environments and these industrial control systems, you can't quite treat them the same as you do with your IT security strategy. Traditional IT security measures do not necessarily translate to the operational side or operational technology. I wouldn't say that they're necessarily lagging behind. I think instead we need to build out a stronger strategy to specifically address those OT-specific needs and adopt strategy to specifically start securing these environments and addressing the unique nuances that it brings. On the consumer side of the IoT, we hear of devices like security
Starting point is 00:05:45 cameras or DVRs being herded into botnets and being used for things like distributed denial of service attacks while still maintaining their original functionality. There's little incentive for either the consumer or the manufacturer to update the installed device. I think the Mirai botnet and WannaCry is the most recent example. They've proven that the insecurities at the consumer level can actually affect enterprises. And in fact, with Mirai, it can affect the internet infrastructure, you know, by going after some infrastructure provider. What that means is that you don't have any incentive on the consumer side. So you have to put regulation in place. And the regulation is going to be difficult to impose on the consumers themselves. So it actually, by necessity, is going to have to be imposed on the manufacturers.
Starting point is 00:06:29 And in the case of Mirai, the way to deal with that is to actually go back to the consumers, excuse me, the makers and say, if you put hard-coded passwords, accounts and passwords in your product, then we're going to penalize you. And you have to conform to certain best practices, such as in order for this device to be installed and usable at a consumer's site, they have to set a password and it has to conform to certain strength requirements. And it has to be updatable. Now that we are seeing more top headlines around various different cyber attacks, I do think that the general consumer space is getting a bit more aware. Granted,
Starting point is 00:07:11 we still have a lot more work to do in that space. And I think we also need to kind of dumb down the language around cybersecurity so it's not deemed to be such a more complex topic and make it more consumer friendly. But really, it's consumer behavior will drive the types of devices or the types of products that OEM should be building. And I think when we talk about kind of liability and in the event of a breach, the various different pieces of the ecosystem, hopefully we'll see that changing where, you know, manufacturers could be taking on more ownership or there will be standards or, you know, guidelines that certain individuals or companies would have to abide by. What do you think of this notion of there needing to be sort of an equivalent of underwriters' laboratory for IoT?
Starting point is 00:07:58 Definitely, I think, top of mind, and I've been hearing it in our circles quite frequently recently. I'd say it's a best practice when we're talking about IoT or really broader to your cybersecurity posture to have a third party, an unbiased third party, an outsider to come and evaluate your environment and essentially provide a risk assessment or recommendation on how best to increase or improve your security. Now we're talking about IoT especially since that's such a nascent and new area where a lot of customers are grappling with how to secure their IoT infrastructure
Starting point is 00:08:31 or IoT networks and don't quite have a strategy in place. Adopting a UL type of program where you have outside consultants to assess where you are in that risk assessment based on these newly connected devices into your environment, certainly a best practice and would recommend. Totally in favor. However, it's an interesting conundrum, right? The UL is really good at dealing with hardware sides of
Starting point is 00:08:55 things. So let's just take the toaster or refrigerator, which seem to be ubiquitous consumer-based IoT devices. When toaster from the UL, if it catches fire in normal operation, then the manufacturer can be held liable for that. And DUL sets the guidelines and does the testing for those things. But then on the other hand, right, so basically the liability falls back on the maker is what I'm saying. On the other hand, when you look at software nowadays, the end-user license agreement pretty much puts all the liability on the consumer. license agreement pretty much puts all the liability on the consumer. So when you start connecting toasters from a UL perspective and then you have software, you basically are combining two different liability models and who actually ends up being liable if the toaster catches fire because
Starting point is 00:09:36 of a software flaw. And then looking at it from a sort of an orthogonal perspective, what if, because of the right to repair, a consumer decides that they're going to soup up their toaster for whatever reason? Now they modify the firmware and the toaster catches on fire. Who's liable at that point? I agree that we should have some sort of UL type of certification, but I don't know how we're going to do that with software. I think there are ways to do it, but I also know that having worked in the software industry for over 30 years that we still don't write secure code. And there's no definitive way to say something that something has a quantitative measure of security. So we've got to figure out how we're going to
Starting point is 00:10:15 quantify what we consider to be code level security, figure out the liability calculus. And once we do those things, if we can do those things, then we'll have a UL type of certification for products. Another emerging and rapidly evolving IoT sector is the automotive industry, with semi-autonomous cars on the roads today and projects well underway for fully autonomous vehicles. And many new cars these days are equipped with integrated mobile internet connections. Car manufacturers are quite concerned. I would say that there's a pretty broad level of maturity or at least commitment to solving the cybersecurity problem. In other words, they're all committed to doing it.
Starting point is 00:10:57 They understand. And interestingly, I don't know how much of the history you know, but back in 2010, the University of California, San Diego and University of Washington put out a paper that basically profiled how you could hack into a car. And then they produced a second paper in 2011 showing how the external threat surface allowed you to hack into it from outside the car. And then those same researchers, three or four years later, sort of mimicked that same research by doing it, you know, sitting in the backseat of the car with a cable snaking
Starting point is 00:11:24 across into the dashboard. And then, you know, a year and a half later, they managed to hack the Jeep remotely across the airwaves. And so some automotive manufacturers are actually taking it absolutely seriously. And they've re-architected their organization to provide security at all levels. And that's great. Some of them actually are concerned about it, but they're not spending a lot of money and they have not yet realized that they need to have governance and guidance across the entire organization instead of just within the car design and then separately in the back end systems, which accept the data and mediate the communications to and from the car. So I see a broad level, but they're all interested in it. But the one thing I will say that's kind of interesting about that is right now we haven't seen a sweeping motive for a threat actor to actually attack the cars. And I personally believe that in most of the cases, aside from some extremists, which comprise probably a fairly small segment of risk. The motive is going to be largely financial and potentially nation state. So the two use cases that I think are most likely are ransomware in
Starting point is 00:12:32 a vehicle, you know, so stopping your car from starting and demanding Bitcoin over your entertainment system, you know, the screen in the car before you can start your car. before you can start your car. And then the second one is a nation state potential motivation would be not to do anything harmful to the passenger. I don't think that general cyber criminals are motivated to harm somebody. That's a ethical line that I don't think is going to be crossed anytime soon, at least not purposefully. But nation states would want to break in and then listen to state secrets on government vehicles, for example, over the hands-free microphone. Those are the two of the more likely motives that I can see in the near future. Looking toward the horizon, both Chris
Starting point is 00:13:16 Poulin and Katie Curtin are cautiously optimistic about the IoT. It's still relatively new and rapidly evolving. Cyber is one of those things that when you make it just an economic incentive, then you're not doing the industry a service. And so I think to a certain extent, we need to do two things. Number one, as researchers and people who are on the leading edge is go start working with these products. So go buy a connected card. Don't just be the fearful security person. Go get those things and start understanding how they work. And, you know, if you've got a technical background, start whacking with them, you know, see if you can
Starting point is 00:13:54 plug into the OBD2 board and leverage some other people's work and see what kind of things seem to be insecure in your vehicle. So in other words, eat your own food in a way. And then that will help to inform you as a security person. And then you can also share that with the research community and in the consumer product and in the enterprise product community. But number two is also start doing something that is more of a crowdsourced way to help people. So one of the things that's sort of interesting to me is, you know, we talked about the consumer products and how Mirai, Botnet took advantage of the fact that consumers don't know how to protect their products. So one of the ways we might be able to do it to help out with consumers is go find these products that are insecure. So if people have web cameras that
Starting point is 00:14:40 are insecure, they have default passwords on them. And then work with law enforcement, because technically we don't have the ability to go and, even if I know what the password is for somebody's webcam and I know that it's insecure, it's beyond my legal rights to actually log in and change their password instead of an email saying, hey, I just helped you. That's not kosher. Don't do that. So work with law enforcement to find out a way to say, look, we found that there's this systemic problem with a webcam or we found a problem with energy and utility. There's been some generator that's exposed online. So work and actually go out and find these things that are insecure, find the right people and notify them. that are insecure, find the right people and notify them. It's sort of what researchers are doing now,
Starting point is 00:15:24 except that they're breaking into, or they're reverse engineering firmware in vehicles and things like that. I'm not saying go do that, because not everybody has that skillset, but there are a lot of us out there that can actually determine when something is exposed when it shouldn't be.
Starting point is 00:15:41 And so take the time to actually find out how to notify someone in authority who has the authority to help to make that thing more secure. And that's just one example, by the way. Find out where your own project is and then try to help other people without demanding payment for it. I think it first starts with awareness and continuing to highlight the risks and issues that these IoT applications and infrastructures could potentially cause. We hear it more often than not that security is that afterthought and oftentimes adopted or considered only when another company within the same vertical or their competitor within the same vertical got hacked.
Starting point is 00:16:22 Then they start thinking about it. We really need to stop that type of thinking and ensure that security is built within the same vertical got hacked, then they start thinking about it. We really need to stop that type of thinking and ensure that security is built within the design phase. And folks are more aware as they're adopting IoT practices to ask those security questions. You know, ensure that you're purchasing the right type of application or device from a trusted or well-known device manufacturer. So you're asking those questions right at the forefront. But outside of that, I think the technology needs to emerge. When we talk about IoT and kind of the nuances that IoT brings, especially around the device itself, it's kind of the wild,
Starting point is 00:16:54 wild west. And when we talk about the various types of devices that are now in the ecosystem and the lack of standards that we really have. So the technology needs to emerge where we can get to a widely adopted standard when we're talking about IoT protocols or IoT clients on the device itself. Because a lot of these devices, the IoT devices, may not be as robust as a smartphone device where you can run robust security software. Being able to apply the right technology and the right security controls to those types of devices, whether it be through known standard protocols or bringing those protections into the network, we really need to bring that technology so it is more readily
Starting point is 00:17:35 accessible for these wide, vast number of devices and device types that are now within the IoT ecosystem. That's Katie Curtin from AT&T and Chris Poulin from Booz Allen Hamilton. In the second part of our program, we take a look at third-party risk. The Poneman Institute recently released an independent research report titled The Internet of Things, A New Era of Third-Party Risk. Dr. Larry Poneman is the chairman and founder of the Poneman Institute, and he's going to take us through some of the report's findings. But first, we'll hear from Gary Roboff, a senior advisor at Shared Assessments and the Santa Fe Group, who were the sponsors of the report.
Starting point is 00:18:14 Third-party risk is a term that really applies to companies who outsource specific activities to vendors or third parties. outsource specific activities to vendors or third parties. And when a company outsources a given activity, it actually can outsource the activity, but it can't outsource the management or the responsibility for controlling that risk. And that's the heart of the issue. So if, for example, I'm a company and I have a certain security hygiene standard, it's incumbent on me to make sure that if I've outsourced that particular activity to another entity, that that company is meeting the same level of security hygiene that would be in place if I had been doing the activity myself.
Starting point is 00:19:05 be in place if I had been doing the activity myself. What we found is that in general, our respondents, 553 qualified respondents to the survey, in general, identified IoT risk as something that is very significant for their organizations. That's Dr. Larry Poneman. At the same time, they recognize the need to innovate in IoT. You know, in other words, IoT is not necessarily a bad thing. It actually accomplishes all sorts of good things for society, and it could be very profitable for companies. So it wasn't about stopping the IoT train, freight train. It was about how do you make it more secure. So even though there was a high level of awareness about IoT as a potential risk area, organizations
Starting point is 00:19:43 were doing very little to manage that risk. You know, one of the surprising findings is that the majority of respondents believe that IoT was not on the radar screen of C-level executives. You know, the people who tried the organization weren't necessarily understanding or seeing IoT risk is something that could be potentially very serious. When we asked whether the board of directors requires assurances that IoT risk among third parties is even being assessed, only 25% of the respondents said, yes, my board wants those assurances. That's a very important finding. Yeah, I mean, I would say that's a bit of a sobering finding. I mean, what do you think is behind this disconnect between what I think many people,
Starting point is 00:20:32 certainly on the IT side, are recognizing as an important risk and the boardroom maybe not being up to speed on realizing it? What we found not only in this study, but, you know, other Poneman studies, on realizing it? What we found not only in this study, but other Poneman studies, is boards of directors and C-level executives are being held responsible by regulators and the public at large for ensuring that information or IT infrastructure is maintained at a high level of security. In reality, a lot of boards and C-level executives do not see security as a strategic issue. They see it as tactical, and therefore they push responsibility down in the organization. And so what we see is a schism where you have security experts and IT operations folks and all sorts of good people fighting fires and dealing with problems, but the issues are not necessarily elevated to the C-level or to members of the board. Occasionally, when there's a disaster,
Starting point is 00:21:31 I'm sure, for example, the Target board of directors, they were informed, but it was probably after the fact. So these are long-lasting problems, and it is incumbent on organizations to build a culture for security so that information about security risks, security expertise, which is being increasingly demanded, at least by regulators in the financial services industry. You've seen a number of large boards actually go hire individuals to serve on the board, usually on risk committees that have a degree of dedicated expertise in emerging risk issues. That's a very important trend. A lot of that is a function of what the tone at the top is like at the board level, how good a job the board has done in structuring a risk management regime that enables two-way
Starting point is 00:22:43 communication. So not only does the board want to be setting the tone for the types of expectations that it has about compliance and ethical behavior and really conveying the risk appetite that any board will develop over time, that certainly needs to be diffused throughout the organization. On the other hand, all levels of the organization have to have a clear communications channel up to the board, and the board has to listen. There has to be a structure in place to enable that conversation to take place. And we're gradually beginning to see, I think, some progress in those areas. So one of the questions we asked, we use a likelihood scale, you know, how likely will this
Starting point is 00:23:34 scenario occur? And we asked our respondent to kind of think two years ahead, what is the likelihood? And we got this one result that was just amazing. The likelihood that a security incident related to unsecured IoT devices or applications could be catastrophic to the company, 94% believe that to be so. Here's another striking result. The loss or theft of data caused by unsecured IoT devices or applications, 78% believe that that was likely over the next two years and finally a cyber attack caused by unsecured iot devices or applications in other words we left a hole in our chain um our chain of trust i should say wasn't working very well and that was 76 believe that to be likely so you know again our respondents believe that this is a problem and it will probably get worse over the next two years, even though we're really not doing a lot
Starting point is 00:24:30 right now to create that secure infrastructure. If you believe what security people inside of organizations say, they really recognize that there is a huge security hole. You know, you can also say that's a very positive outcome. I think what you have to then look at are other things that have come out of the survey. Things like, is managing third-party IoT risk a priority in your organization? a priority in your organization? Only 30% said yes, right? And then does your organization allocate specific resources to managing IoT third-party risks? Only 27% said yes. So you have that gap between, at the moment, the recognition and sort of you're getting a sense of the culture within organizations. And what you hope and expect is that that gap will begin to shrink pretty quickly. In terms of the regulatory framework, do we see, what is the influence that we're going to see from there?
Starting point is 00:25:39 In other words, you know, buildings were required to have fire escapes, and that helped a lot more people survive fires. Do we think we're going to be in a situation where we're going to see more regulations to ensure that some of these vulnerabilities are taken care of? My thinking is twofold. in some sectors, such as financial services, there's already high-level guidance that actually incorporates in a broad way the Internet of Things. I'm not sure that boards have recognized that yet, but they will, and regulators will enforce it. You can see an environment where there are many different types of attacks that cause different sectors. We've talked about the medical sector. We've talked about the automobile industry.
Starting point is 00:26:32 Anything that is connected where you have the ability to cause a headline that involves serious consequences to a large number of individuals, or even in some cases, a small number of individuals, is likely to involve some type of standardized approach to solve the problem. In some places, that's definitely going to be a regulatory intervention. It's really essential to include third-party IoT risk in all levels of governance, right? So we see that that is missing as a priority at the board level. We see that resources are not being allocated properly to address IoT risks today. So number one recommendation is there has to be recognition of the problem that's got to be incorporated into enterprise risk management systems and processes that exist already. The board has to understand fully
Starting point is 00:27:42 what the consequences of IoT attacks might be for their firm. Recommendation number two is that asset management processes and inventory systems really must include IoT devices. And more than just a simple inventory, it's essential that firms understand the security characteristics of every IoT device that's both within their four walls and ideally within the four walls of their vendors if those vendors support critical activities that can cause serious consequences for the firm that has done the outsourcing. And when devices are found to have inadequate security controls, they need to be replaced and they should be replaced quickly. You want to make sure that your third-party assessment techniques and the processes around those techniques
Starting point is 00:28:37 are really adequate to ensure the presence and effectiveness of controls around IoT devices. Very basic. So IoT today, it's about technology that allows us to do all sorts of really great things. There will continue to be innovation in the IoT ecosystem. But the idea is that there's no reason why we don't build security as part of the innovation process. In other words, it's not an either-or, but it's both. There's no reason why we can't start to see organizations in the early phase, during the engineering phase of the product development lifecycle, starting to think about how to secure those devices. I think regulations will play an important role,
Starting point is 00:29:21 but I think it's going to be incumbent upon organizations, even from a profitability point of view, to make sure that they're starting to build security into these devices at a very early phase in the development lifecycle. We're starting to see that in the medical device area, but we don't see that in other IoT devices like your refrigerator or microwave or television. Or your car, really. Or your car, yeah, exactly. Yeah, Gary, I'm curious, you know, when it comes to quantifying the risk from IoT devices, you know, again, using the analogy of fire prevention, you know, I can, when I'm thinking about fire for the building that I
Starting point is 00:29:58 own, I can install sprinklers and I can also buy insurance. And those are two different approaches to dealing with the possibility of having a fire. In something that's rapidly evolving the way it is and also is as new as it is, how do you go about helping organizations determine how best to invest their money in that spectrum of possible ways to deal with these sorts of risks? You know, first of all, it's very important to collaborate. You want to be able to collaborate with peers, with associations. You want to socialize approaches in ways that will give you insights that you might not necessarily see within your own four walls. I can't stress how important it is to collaborate with industry experts, with associations, even with regulators.
Starting point is 00:30:53 That can be a very important way to even begin to think about how you address some of the concerns. There are concerns that come from outside and about which you might have little ability to stop. An example of that is a distributed denial of service attack. You're going to have no effective say about whether an attempt of a denial of service attack happens on your company, but you will have something to say about how effective it can be. We've already seen distributed denial of service attacks that come from IoT devices. Firms ought to be taking steps to prevent the consequences of those attacks from having a material impact on their ongoing operations.
Starting point is 00:31:47 There are steps that you can take as a corporation or as any organization to help prepare yourself, both from the perspective of what happens within your own four walls and what happens with the vendors that you use to help you complete processes that are essential. We've talked about some of those. It's about inventory control. It's about making sure that you have effective controls over all of your IoT devices. That's sort of IoT risk management 101. And to the extent that you can follow through with even some very basic steps, you have the ability to at least partially mitigate the consequences of IoT issues in your own environment? We think that this research is important because it starts to establish a risk management perspective, the need to think broadly about how IoT devices in different forms will impact
Starting point is 00:33:00 the organization. And I think this shows that we have a lot of work to do to improve the state of security and security posture, you know, with respect to IoT. But it's a starting point. And as Gary mentioned, there's also some lessons that basic steps that organizations can take immediately that will not drive costs, up costs too much anyway, like policies and procedures and training and creating awareness, creating a governance process and the culture for security, I think will go a long way to reducing some of these more salient IoT risks that we discussed.
Starting point is 00:33:35 And that's our CyberWire special edition. Our thanks to Dr. Larry Poneman, Gary Roboff, Katie Curtin, and Chris Poulin for joining us. If you enjoyed this program, we hope you'll share it with your friends and colleagues, and will subscribe to our podcast and leave a review on iTunes. Thank you. Editor is Peter Kilby, and I'm Dave Bittner. Thanks for listening. Cyber threats are evolving every second, and staying ahead is more than just a challenge. It's a necessity. That's why we're thrilled to partner with ThreatLocker,
Starting point is 00:34:27 a cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default-deny approach can keep your company safe and securely. Visit ThreatLocker.com today to see how a default deny approach can keep your company safe and compliant.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.